All language subtitles for 007 Planning a Test (OBJ 1.2)

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese Download
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,120 --> 00:00:02,009 Instructor: When it comes to penetration testing, 2 00:00:02,009 --> 00:00:04,170 planning is incredibly important. 3 00:00:04,170 --> 00:00:06,990 There are three major factors for any assessment. 4 00:00:06,990 --> 00:00:09,750 Time cost, and quality. 5 00:00:09,750 --> 00:00:11,850 These three factors are always in competition 6 00:00:11,850 --> 00:00:14,250 with each other and decisions on their priority 7 00:00:14,250 --> 00:00:17,190 have to be agreed upon between the penetration tester 8 00:00:17,190 --> 00:00:20,490 and the organization that's contracting that engagement. 9 00:00:20,490 --> 00:00:23,580 For example, if you want the assessment to be faster, 10 00:00:23,580 --> 00:00:25,050 it's gonna cost you more money 11 00:00:25,050 --> 00:00:28,080 or it's gonna require a lower quality threshold. 12 00:00:28,080 --> 00:00:30,960 If you want a really in depth and high quality engagement, 13 00:00:30,960 --> 00:00:32,910 then it might cost additional resources 14 00:00:32,910 --> 00:00:34,680 in terms of people and money, 15 00:00:34,680 --> 00:00:37,080 or it might take you more time. 16 00:00:37,080 --> 00:00:40,140 If you want an inexpensive penetration test to be conducted 17 00:00:40,140 --> 00:00:42,420 then you really shouldn't expect it to be high quality 18 00:00:42,420 --> 00:00:44,220 or really quick. 19 00:00:44,220 --> 00:00:47,250 Again, these are competing factors that you must consider 20 00:00:47,250 --> 00:00:48,420 during your planning, 21 00:00:48,420 --> 00:00:49,980 and it's also important to understand 22 00:00:49,980 --> 00:00:51,660 what the company is expecting 23 00:00:51,660 --> 00:00:54,960 and what you can provide during the proposed timeframe. 24 00:00:54,960 --> 00:00:56,730 There are various areas of consideration 25 00:00:56,730 --> 00:00:58,470 when you're planning an assessment. 26 00:00:58,470 --> 00:00:59,820 This includes things like, 27 00:00:59,820 --> 00:01:00,746 who is the target audience? 28 00:01:00,746 --> 00:01:03,240 What is the objective? 29 00:01:03,240 --> 00:01:05,550 Is this a compliance based assessment? 30 00:01:05,550 --> 00:01:07,590 What resources are required? 31 00:01:07,590 --> 00:01:10,320 Who will we communicate with and how often? 32 00:01:10,320 --> 00:01:12,180 What product will be required to be presented 33 00:01:12,180 --> 00:01:13,950 at the end of the assessment? 34 00:01:13,950 --> 00:01:16,830 Are there technical constraints placed upon the engagement? 35 00:01:16,830 --> 00:01:20,640 And how comprehensive will the penetration test need to be? 36 00:01:20,640 --> 00:01:23,610 First, we have to ask who is the target audience 37 00:01:23,610 --> 00:01:25,020 for the penetration test 38 00:01:25,020 --> 00:01:27,480 and what kind of business do they perform? 39 00:01:27,480 --> 00:01:29,305 Are they a small local retail store 40 00:01:29,305 --> 00:01:31,080 that needs a simple payment card 41 00:01:31,080 --> 00:01:32,850 industry data security standard, 42 00:01:32,850 --> 00:01:36,120 or PCI DSS compliance penetration test, 43 00:01:36,120 --> 00:01:38,580 or are they a large multinational bank 44 00:01:38,580 --> 00:01:40,380 with offices all over the world 45 00:01:40,380 --> 00:01:43,590 who want you to test all 100,000 branches? 46 00:01:43,590 --> 00:01:45,540 Depending on the answer to these questions, 47 00:01:45,540 --> 00:01:48,150 the scope of your assessment is gonna be vastly different 48 00:01:48,150 --> 00:01:52,200 because of their different sizes, missions, and operations. 49 00:01:52,200 --> 00:01:55,770 Second, what is the objective of the penetration test? 50 00:01:55,770 --> 00:01:57,990 Is the organization contracting the engagement 51 00:01:57,990 --> 00:02:01,230 in order to meet a compliance requirement or regulation? 52 00:02:01,230 --> 00:02:02,760 Are they conducting due diligence 53 00:02:02,760 --> 00:02:04,650 in their testing and software assurance 54 00:02:04,650 --> 00:02:06,990 before a product is gonna be released? 55 00:02:06,990 --> 00:02:10,020 Both of these are valid objectives for a penetration test 56 00:02:10,020 --> 00:02:12,690 but each of them requires a different approach. 57 00:02:12,690 --> 00:02:15,510 By understanding your target audience and their budget, 58 00:02:15,510 --> 00:02:17,160 you can design a better engagement, 59 00:02:17,160 --> 00:02:19,290 that'll more efficiently and effectively 60 00:02:19,290 --> 00:02:21,210 meet their objectives. 61 00:02:21,210 --> 00:02:23,670 Third, what resources will be required 62 00:02:23,670 --> 00:02:25,920 to carry out the penetration test? 63 00:02:25,920 --> 00:02:28,110 For example, if my company was hired 64 00:02:28,110 --> 00:02:31,080 to do a penetration test on a large chain of retail stores 65 00:02:31,080 --> 00:02:32,850 that's located out in Hawaii, 66 00:02:32,850 --> 00:02:36,600 but that company is not allocated any funding for travel, 67 00:02:36,600 --> 00:02:38,370 then my team won't be able to conduct 68 00:02:38,370 --> 00:02:40,110 a physical penetration test 69 00:02:40,110 --> 00:02:42,990 because our offices are not located in Hawaii 70 00:02:42,990 --> 00:02:45,300 and we're gonna have to fly out there to do it. 71 00:02:45,300 --> 00:02:48,000 On the other hand, if they have a really large budget, 72 00:02:48,000 --> 00:02:51,150 then we can support a very large or in depth assessment 73 00:02:51,150 --> 00:02:54,060 including onsite testing of their physical security 74 00:02:54,060 --> 00:02:57,390 as well as resiliency to social engineering attacks. 75 00:02:57,390 --> 00:02:59,760 Now, we might also be able to fly people on site, 76 00:02:59,760 --> 00:03:02,490 hire contractors, have a longer timeline, 77 00:03:02,490 --> 00:03:03,540 increase the scope 78 00:03:03,540 --> 00:03:06,330 and have greater access to people in technology. 79 00:03:06,330 --> 00:03:08,376 However, if we're given a smaller budget, 80 00:03:08,376 --> 00:03:10,860 then we're gonna have to adjust the scope downward 81 00:03:10,860 --> 00:03:13,680 appropriately to meet those restrictions. 82 00:03:13,680 --> 00:03:16,350 Now, let's go back to the Hawaii example for a minute. 83 00:03:16,350 --> 00:03:18,720 Assuming that we have a smaller budget assigned 84 00:03:18,720 --> 00:03:20,460 we're then gonna have to minimize the scope 85 00:03:20,460 --> 00:03:22,380 to only provide an external assessment 86 00:03:22,380 --> 00:03:24,660 of those networks over the internet. 87 00:03:24,660 --> 00:03:26,790 Now, if that meets the company's objectives, 88 00:03:26,790 --> 00:03:29,040 then we can move into contract negotiation 89 00:03:29,040 --> 00:03:30,900 and start agreeing to a price. 90 00:03:30,900 --> 00:03:32,670 However, if it doesn't, 91 00:03:32,670 --> 00:03:35,460 then it's gonna be important to negotiate a larger budget 92 00:03:35,460 --> 00:03:37,680 in order to support an onsite assessment 93 00:03:37,680 --> 00:03:39,930 or we're gonna have to turn down the assignment 94 00:03:39,930 --> 00:03:41,970 and recommend they hire a penetration tester 95 00:03:41,970 --> 00:03:43,920 who is local to their company. 96 00:03:43,920 --> 00:03:45,540 Now, when we're looking at resources 97 00:03:45,540 --> 00:03:47,130 and requirements for this test, 98 00:03:47,130 --> 00:03:48,510 it's also important to consider 99 00:03:48,510 --> 00:03:50,550 what resources are gonna be needed 100 00:03:50,550 --> 00:03:53,850 and the costs associated with having those resources. 101 00:03:53,850 --> 00:03:55,230 Do we need to be onsite 102 00:03:55,230 --> 00:03:57,960 or can we achieve the same objectives remotely? 103 00:03:57,960 --> 00:04:00,420 Do we need the test done from inside the company network 104 00:04:00,420 --> 00:04:02,880 or from an outside perspective? 105 00:04:02,880 --> 00:04:05,940 What requirements must be met during the test? 106 00:04:05,940 --> 00:04:08,400 Do we need to use end-to-end encryption? 107 00:04:08,400 --> 00:04:10,890 All of these requirements will take up additional resources 108 00:04:10,890 --> 00:04:12,240 from the project. 109 00:04:12,240 --> 00:04:14,490 For example, if we're gonna be required to test 110 00:04:14,490 --> 00:04:17,040 for both known and unknown vulnerabilities, 111 00:04:17,040 --> 00:04:19,140 we're gonna have to come up with our own exploits 112 00:04:19,140 --> 00:04:22,470 which cost us more time, more money, and more resources, 113 00:04:22,470 --> 00:04:25,410 than using existing toolkits like the Metasploit Framework 114 00:04:25,410 --> 00:04:28,710 with its open source and well-documented exploits. 115 00:04:28,710 --> 00:04:30,930 Next, we need to ask if this test 116 00:04:30,930 --> 00:04:33,270 is part of a compliance based assessment. 117 00:04:33,270 --> 00:04:35,850 If so, the engagement becomes a little easier 118 00:04:35,850 --> 00:04:38,670 because there are checklists provided by most organizations 119 00:04:38,670 --> 00:04:41,760 or legislative bodies, for your testers to utilize 120 00:04:41,760 --> 00:04:44,040 and this will ensure that all of the appropriate devices 121 00:04:44,040 --> 00:04:46,350 have been scanned to the appropriate level. 122 00:04:46,350 --> 00:04:50,490 For example, a PCI DSS scan has a specific checklist 123 00:04:50,490 --> 00:04:52,500 that an assessor or penetration tester 124 00:04:52,500 --> 00:04:54,660 has to utilize to verify compliance 125 00:04:54,660 --> 00:04:57,210 with the PCI DSS standards that are used 126 00:04:57,210 --> 00:04:59,040 for credit card processing. 127 00:04:59,040 --> 00:05:00,660 Even though we're gonna cover the details 128 00:05:00,660 --> 00:05:02,850 of those during the scoping of our assessments, 129 00:05:02,850 --> 00:05:05,730 it's also important early on to be able to outline them 130 00:05:05,730 --> 00:05:07,290 in the planning phase to ensure 131 00:05:07,290 --> 00:05:09,330 that the organization understands the level 132 00:05:09,330 --> 00:05:11,160 of resourcing that's going to be needed 133 00:05:11,160 --> 00:05:13,380 to meet the proposed requirements. 134 00:05:13,380 --> 00:05:14,700 Now, during our planning, 135 00:05:14,700 --> 00:05:17,610 we're also gonna outline our communication plan. 136 00:05:17,610 --> 00:05:19,920 Who can the penetration tester communicate with 137 00:05:19,920 --> 00:05:21,180 during this assessment 138 00:05:21,180 --> 00:05:23,910 and how often will that communication occur? 139 00:05:23,910 --> 00:05:26,370 For example, if the chief technology officer 140 00:05:26,370 --> 00:05:27,600 hired your company, 141 00:05:27,600 --> 00:05:29,670 are you only allowed to speak with them 142 00:05:29,670 --> 00:05:30,930 or can you also speak with 143 00:05:30,930 --> 00:05:32,760 the information technology department 144 00:05:32,760 --> 00:05:34,410 about the fact that you're planning to conduct 145 00:05:34,410 --> 00:05:36,030 a penetration test? 146 00:05:36,030 --> 00:05:37,260 The answer is gonna be dependent 147 00:05:37,260 --> 00:05:39,090 on your contract with the organization 148 00:05:39,090 --> 00:05:41,040 and whether they're trying to test their systems, 149 00:05:41,040 --> 00:05:43,680 their personnel, or both of these. 150 00:05:43,680 --> 00:05:45,390 Even if you're conducting a blind test 151 00:05:45,390 --> 00:05:48,270 to see if people fall for your tricks in social engineering, 152 00:05:48,270 --> 00:05:50,250 you still are gonna need a trusted agent 153 00:05:50,250 --> 00:05:51,810 inside that organization 154 00:05:51,810 --> 00:05:53,490 who you're gonna be able to communicate with 155 00:05:53,490 --> 00:05:55,320 if something is going wrong. 156 00:05:55,320 --> 00:05:56,910 This person will also contact you 157 00:05:56,910 --> 00:05:59,130 during the deconfliction process to determine 158 00:05:59,130 --> 00:06:00,390 if a detected attack 159 00:06:00,390 --> 00:06:02,550 is actually your penetration testing team 160 00:06:02,550 --> 00:06:04,470 or has some real threat actor 161 00:06:04,470 --> 00:06:06,630 actually hacked the organization. 162 00:06:06,630 --> 00:06:08,490 You need to have these lifelines established 163 00:06:08,490 --> 00:06:10,350 well before the testing begins 164 00:06:10,350 --> 00:06:13,350 so set this up while you're planning your engagement. 165 00:06:13,350 --> 00:06:15,900 Next, we should ask, what product or report 166 00:06:15,900 --> 00:06:18,145 will the penetration tester provide the organization 167 00:06:18,145 --> 00:06:20,850 at the conclusion of this engagement? 168 00:06:20,850 --> 00:06:22,590 Now, when we get to domain four, 169 00:06:22,590 --> 00:06:25,080 we're gonna talk all about reporting and communication 170 00:06:25,080 --> 00:06:27,390 in depth and I'm gonna provide you with the details 171 00:06:27,390 --> 00:06:29,730 of a standard penetration testing report. 172 00:06:29,730 --> 00:06:31,170 But keep in mind, 173 00:06:31,170 --> 00:06:33,480 these can be modified by the organization 174 00:06:33,480 --> 00:06:35,490 to whom you're providing the service. 175 00:06:35,490 --> 00:06:37,740 Some organizations I've worked with previously 176 00:06:37,740 --> 00:06:39,870 have requested the executive summary be provided 177 00:06:39,870 --> 00:06:42,330 as a brief using a PowerPoint format 178 00:06:42,330 --> 00:06:44,250 and others want to have something written 179 00:06:44,250 --> 00:06:46,140 in long form prose. 180 00:06:46,140 --> 00:06:48,030 We also need to find out how detailed 181 00:06:48,030 --> 00:06:49,500 the report needs to be. 182 00:06:49,500 --> 00:06:52,200 For example, if I've run a vulnerability scan 183 00:06:52,200 --> 00:06:54,300 I might have a 300 page document 184 00:06:54,300 --> 00:06:55,980 that I can provide to the organization 185 00:06:55,980 --> 00:06:58,170 with every single vulnerability that was discovered 186 00:06:58,170 --> 00:06:59,310 in their network, 187 00:06:59,310 --> 00:07:01,590 but most companies would rather us prioritize 188 00:07:01,590 --> 00:07:04,080 which vulnerabilities they need to address first 189 00:07:04,080 --> 00:07:05,490 as well as how much time and money 190 00:07:05,490 --> 00:07:07,290 it's gonna cost to fix them. 191 00:07:07,290 --> 00:07:09,330 Again, this is all negotiable 192 00:07:09,330 --> 00:07:12,120 and should be discussed during the planning phase. 193 00:07:12,120 --> 00:07:15,150 Next, is the customer gonna place any technical constraints 194 00:07:15,150 --> 00:07:16,920 on the penetration test? 195 00:07:16,920 --> 00:07:19,980 For example, are you allowed to test their database servers, 196 00:07:19,980 --> 00:07:22,230 their web servers, or their printers? 197 00:07:22,230 --> 00:07:24,780 Any limitations or constraints have to be understood 198 00:07:24,780 --> 00:07:26,070 during the planning phase 199 00:07:26,070 --> 00:07:28,320 so the assessment can be properly scoped. 200 00:07:28,320 --> 00:07:29,910 If I was testing an organization 201 00:07:29,910 --> 00:07:32,220 that focuses on manufacturing, for example, 202 00:07:32,220 --> 00:07:33,990 one of the big concerns I have 203 00:07:33,990 --> 00:07:36,570 is whether or not my team and I can conduct exploits 204 00:07:36,570 --> 00:07:38,910 against their ICS and SCADA systems 205 00:07:38,910 --> 00:07:41,430 because these systems are very likely to break 206 00:07:41,430 --> 00:07:43,800 if you're using standard penetration testing tools, 207 00:07:43,800 --> 00:07:45,690 if you don't know what you're doing. 208 00:07:45,690 --> 00:07:47,910 Often those systems are removed from the scope 209 00:07:47,910 --> 00:07:51,210 of our assessment or maybe we're required to test them 210 00:07:51,210 --> 00:07:53,640 and we're gonna bring in some specialists to assist us 211 00:07:53,640 --> 00:07:55,530 to make sure we don't break anything. 212 00:07:55,530 --> 00:07:58,590 Now, either of those two options is perfectly acceptable. 213 00:07:58,590 --> 00:08:01,020 It's just important to agree to it upfront 214 00:08:01,020 --> 00:08:03,600 and detail that decision inside of the contract 215 00:08:03,600 --> 00:08:05,640 and your scope of the engagement. 216 00:08:05,640 --> 00:08:07,260 Now, when planning an assessment, 217 00:08:07,260 --> 00:08:09,570 it's also important to ensure that the organization 218 00:08:09,570 --> 00:08:12,330 understands that the assessment is just a snapshot 219 00:08:12,330 --> 00:08:14,460 of their current security posture. 220 00:08:14,460 --> 00:08:16,530 If we completed an assessment today, 221 00:08:16,530 --> 00:08:18,240 it can only tell the organization 222 00:08:18,240 --> 00:08:21,270 what vulnerabilities existed as of today. 223 00:08:21,270 --> 00:08:23,610 A new vulnerability may be discovered in a week 224 00:08:23,610 --> 00:08:26,550 and it may have taken us three weeks to finalize a report. 225 00:08:26,550 --> 00:08:29,820 Obviously, our assessment, and in turn our report, 226 00:08:29,820 --> 00:08:32,429 are not gonna cover that new vulnerability. 227 00:08:32,429 --> 00:08:34,409 When you're negotiating an assessment, 228 00:08:34,409 --> 00:08:36,840 be clear that this is a point in time assessment 229 00:08:36,840 --> 00:08:39,000 and this means that you're only gonna be held liable 230 00:08:39,000 --> 00:08:41,039 for disclosing the vulnerabilities that were discovered 231 00:08:41,039 --> 00:08:42,900 at the time of the assessment. 232 00:08:42,900 --> 00:08:45,300 After all, new vulnerabilities are discovered 233 00:08:45,300 --> 00:08:46,560 every single day 234 00:08:46,560 --> 00:08:47,850 and you can't be expected to know 235 00:08:47,850 --> 00:08:51,000 about a vulnerability that hasn't been discovered yet. 236 00:08:51,000 --> 00:08:53,340 Finally, your client also needs to determine 237 00:08:53,340 --> 00:08:56,100 how comprehensive the engagement needs to be. 238 00:08:56,100 --> 00:08:59,100 Are you gonna go out and look for every single vulnerability 239 00:08:59,100 --> 00:09:01,350 or are we just trying to find at least one way 240 00:09:01,350 --> 00:09:03,180 to break into the network? 241 00:09:03,180 --> 00:09:06,450 While some clients want the former, others want the latter. 242 00:09:06,450 --> 00:09:08,460 This is another key consideration 243 00:09:08,460 --> 00:09:11,520 as it will greatly affect the size, scope, and duration 244 00:09:11,520 --> 00:09:14,730 of the assessment and the resources that it requires. 245 00:09:14,730 --> 00:09:17,430 Remember, the more comprehensive the engagement, 246 00:09:17,430 --> 00:09:20,340 the longer the duration and the larger the scope. 247 00:09:20,340 --> 00:09:21,540 Another thing to determine 248 00:09:21,540 --> 00:09:23,370 is which parts of the organization 249 00:09:23,370 --> 00:09:25,980 are going to be included in this assessment? 250 00:09:25,980 --> 00:09:28,110 Are we testing the entire organization 251 00:09:28,110 --> 00:09:30,390 or just the information technology department? 252 00:09:30,390 --> 00:09:31,440 Whichever it is, 253 00:09:31,440 --> 00:09:33,420 it needs to be agreed upon upfront 254 00:09:33,420 --> 00:09:35,220 during the planning and scoping phase 255 00:09:35,220 --> 00:09:37,080 and then detailed in your final report 256 00:09:37,080 --> 00:09:39,330 during the reporting and communication phase. 257 00:09:40,466 --> 00:09:42,553 (soft tones) 19640

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.